Most of the traditional digital copyright management platforms are centralized, which is easy to cause the leakage of private data, that the rights of copyright owners are damaged. An image trading system is implemented using decentralized blockchain technology in this paper. The distributed storage of images is implemented using interplanetary file system (IPFS), the hash address returned by IPFS is stored in the blockchain, which solves the blockchain problems of difficult to capacity expansion and expensive storage space. The private data of images are encrypted storage to ensure the access security of data information. Unique verification of images to ensure that the same image cannot be registered repeatedly. Tests show that the system has good performance and security.
Because of the sensitivity of traditional hash algorithms to original data, it is not suitable for image content authentication. In this paper, we analyze and compare image hashing algorithms, realized a difference-value hashing algorithm (dHash), and apply the dHash algorithm to a blockchain-based image copyright protection system. dHash algorithm determines the similarity of images to ensure the uniqueness of image copyright.The test shows that the dHash algorithm has high accuracy and faster speed of images with Gaussian noise.
With the popularity of high-precision printing equipment, leading to the widespread spread of pirated products. Because of some disadvantages in traditional anti-counterfeiting printing, a half-tone anti-counterfeiting image generation algorithm based on microstructure dots is proposed. First, the word library automatically generates the character word library containing the grayscale and morphological differences, and then matches and replaces the image according to the similarity of the image, so as to realize the generation of the anti-counterfeiting image. Experimental results show that the anti-counterfeiting image based on microstructure dot generated by this algorithm is visually small from the original image, and after the anti-counterfeiting image is enlarged, the embedded micro characters are clearly visible, and the algorithm has broad application prospects in packaging anti-counterfeiting.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.